our Blog

Read our latest articles

Jun 26, 2023

Stop! And think, before you act on that email

Diving into emails without paying much attention? It’s a routine task, right? Whether it’s data requests or invoice […]

Jun 13, 2023

Is your business data at risk?

When you replace old computers or external drives, do you delete data and then just… get rid of […]

Feb 11, 2023

How to avoid new phishing scams

Cyber criminals are getting smarter. This recent malware threat is unusually smart. It impersonates a highly trusted brand name to get a foot in the door.

Jan 12, 2023

Giving your employees trust & freedom: Monitoring employee software

As a business owner, it can be tempting to use monitoring software to keep tabs on your employees. […]

Jan 12, 2023

Benefits of having a PC Health Check

Book now for an IT check-up, to get in great shape for the journey ahead? You do it for yourself and your car – now do the same for your workplace tech

Jan 01, 2023

How to avoid your employees feeling “tech shame”?

Gen Z and even some Millennial employees are less tech savvy than many employers might expect. It’s an assumption that’s leading to a sense of ‘tech shame’.

Dec 19, 2022

Windows is the prime target for cyber criminals

Microsoft’s Windows operating system continues to hold a colossal presence in corporate environments globally. This widespread adoption makes […]

Dec 13, 2022

What are Passkeys and how do they work?

Cyber threats are evolving and becoming more sophisticated, ensuring robust security for both personal and business data is […]

christmas cover

Dec 06, 2022

How to prevent a data breach at work?

Data breaches are not just a possibility but an increasingly common reality, posing a severe threat to companies […]

zoom post cover

Nov 29, 2022

Zoom vs Teams, what are the benefit of each?

Video Conferencing Giants In the age of remote work, video conferencing is not a luxury, but a necessity. […]